#2 How To Analyse a Malicious Word Document

Поделиться
HTML-код
  • Опубликовано: 28 ноя 2024

Комментарии •

  • @migry
    @migry 7 месяцев назад +1

    Found your channel after searching for Ghidra, but decided to watch from your first video. This one was very interesting!

  • @vikalpdutttripathi
    @vikalpdutttripathi 3 года назад +3

    Haven't found any better video than this on Malware Analysis. Keep up the good work mate👍

    • @0xf0x
      @0xf0x  3 года назад +1

      Thanks mate really appreciate it, always great to hear people get something out of these

  • @sulthansk6444
    @sulthansk6444 4 года назад +1

    I am unaware of(inetsim & fakedns)
    Now I understand the complete concept through your video
    Thanks for the video...

    • @0xf0x
      @0xf0x  4 года назад +1

      That’s awesome to hear, thanks for the feedback 👍

    • @sulthansk6444
      @sulthansk6444 4 года назад

      @@0xf0x please post more videos on malwares...

  • @michaelk8642
    @michaelk8642 3 года назад +2

    Very informative video. Curious of the types of tools used to study malware and you explained and gave examples very well. Thanks.

    • @0xf0x
      @0xf0x  3 года назад +1

      No probs, always great to hear the videos are well received and useful

  • @RickHenderson
    @RickHenderson 3 года назад +1

    Loved it, excellent work. I started learning about Kali, but I’m now doing more maldoc analysis so I’m glad you showed off a bit of remnux. I’m going to take a closer look at it.

  • @one_shot_phill2368
    @one_shot_phill2368 3 года назад +1

    Brilliant video, you’ve got me hooked!

  • @aijaz5830
    @aijaz5830 4 года назад +1

    Man this was such an amazing video. Keep posting such quality content

    • @0xf0x
      @0xf0x  4 года назад

      Glad to hear it, thanks for watching 👍

  • @Amm9
    @Amm9 3 года назад +1

    Great video! Just subscribed.

  • @derrickshaffer7206
    @derrickshaffer7206 3 года назад +1

    How do you get the suspicious file into your lab safely? If you're in host-only mode you can't transfer it from a web source. I assume you want to keep the VM isolated from the host so you can't copy via drag and drop. So what method do you recommend using for transferring those files into your lab?

    • @0xf0x
      @0xf0x  3 года назад +2

      Zip and password protect any malicious files, you can then safely transfer them to your lab, I use drag and drop. If you want to download from a web source such as app.any.run then switch the VM to NAT mode so it has an internet connection and then switch back to host only mode when done.

  • @SquareZeroGaming
    @SquareZeroGaming 2 года назад

    Amazing Content!!

  • @azoz8608
    @azoz8608 4 года назад +1

    Very good explanation. keep it up :)

    • @0xf0x
      @0xf0x  4 года назад

      Thanks!

  • @张逸凡-l7h
    @张逸凡-l7h 2 года назад

    Excellent work! Possible to share configuration of inetsim.conf please? I failed all the time and want to compare. Thanks!

  • @nitinmaurya6835
    @nitinmaurya6835 3 года назад +1

    Hey Hi, thanks for the great video tutorial. I am starting with your playlist. Just got stuck at process monitor step. how did you find out that powershell is running in this particular svchost.exe ?

    • @0xf0x
      @0xf0x  3 года назад +1

      Hey, I saw PowerShell in the process tree in ProcMon. As I hadn’t launched PowerShell and know it can be used for RCE I knew it was going to be something that the Word document had launched 👍

  • @surajsawant6469
    @surajsawant6469 4 года назад +1

    Well elaborated but I didn't get how you jumped to powershell.exe (13.25) when it was not really a child process by word document process. please explain if possible.

    • @0xf0x
      @0xf0x  4 года назад +3

      Great question, any processes such as cmd.exe and powershell.exe that can be used to execute code will always be of interest in this type of scenario. I knew I hadn’t launched powershell so based on that I knew the document must have launched it to do something malicious.

    • @surajsawant6469
      @surajsawant6469 4 года назад +2

      @@0xf0x Ohh...thanks a lot for the quick response and clarification. will wait for upcoming vids. :) keep it up.

    • @sagibersodsky731
      @sagibersodsky731 4 года назад +2

      Hello, I Did a Debug to such files. It seems that the macro uses Win32_ProcessStartup and Win32_Process, those are Classes that can be used for running Powershell Throught WmiPrvse.exe. It is Very Well Documented here - www.bromium.com/wp-content/uploads/2019/07/Bromium-Emotet-Technical-Analysis-Report.pdf. HAVE FUN :)

  • @mustafahussien4410
    @mustafahussien4410 4 года назад +1

    Perfect, Well Done

  • @venkateshs3411
    @venkateshs3411 4 года назад

    Hey , I dont understand a thing , how did you get the response 200 on since you are host only ? , Since you are on clean-Host there must be no internet connection , right ? IF you are not on Host-only ,then how did you transfer using winscp?

    • @0xf0x
      @0xf0x  4 года назад

      All the network traffic is being forwarded onto the Remnux VM. Inetsim is running on Remnux which is emulating a number services on specific ports such as http on port 80. That’s why I get a 200 response.

    • @venkateshs3411
      @venkateshs3411 4 года назад

      @@0xf0x Thanks for your response , i tried to deobfuscate the macros in this Emotet , but there is some wired appears Code : Fack = Xhrcwkmbidam.Diwqqciyfbjs.Tag
      Yaiciqbtusvb = Split(Tvsghavnh + LTrim(LTrim(Fack)), "///") i cannot find Diwqqciyfbjs in the function Xhrcwkmbidam , , can you help me ?

  • @Randomdude-i8x
    @Randomdude-i8x 2 года назад

    You can just unzip the file and inspect the inner xml's. You do not need fancy tools. I would not recommend just opening it and looking for network traffic unless you really know what you are doing.

    • @0xf0x
      @0xf0x  2 года назад

      The idea of the video is to safely demo how to use malware analysis tools and give people an understanding of what the document is doing behind the scenes.

  • @ahmetpayasloglu7134
    @ahmetpayasloglu7134 3 года назад

    When your network setting is host only , how did you download this malware sample ? Thank you.

    • @0xf0x
      @0xf0x  3 года назад +1

      Switch to NAT from host only mode. In video #1 I keep two snapshots saved of my VM, 1 in host only and one in NAT mode

    • @ahmetpayasloglu7134
      @ahmetpayasloglu7134 3 года назад

      @@0xf0x Thank you for answer.

  • @metehandagl9068
    @metehandagl9068 3 года назад

    Man thank your for the video. But I didn't understand that why you used NAT setting. You didn't use host only. You had a internet connection. Is it safe? Because the malware can spread to your host machine.

    • @0xf0x
      @0xf0x  3 года назад

      Thanks man glad you liked it. I definitely had host only mode in place in this video, that’s why the traffic routed to the Remnux machine 👍

    • @metehandagl9068
      @metehandagl9068 3 года назад

      @@0xf0x thank you for the answer man, but I don't understand that, you was searching on the google and downloading files. How do you do this with host only man? Can you explain for me , thank you .

    • @0xf0x
      @0xf0x  3 года назад +1

      @@metehandagl9068 No probs, I was searching on the internet using my host machine. The Guest VM was host only

    • @metehandagl9068
      @metehandagl9068 3 года назад

      @@0xf0x I got it man . Thank you so much. We are waiting for your new excellent videos!

    • @0xf0x
      @0xf0x  3 года назад

      @@metehandagl9068 Cheers, i will try and get some out soon. Life has been a bit crazy the past few months.

  • @eladbruchim2148
    @eladbruchim2148 3 года назад

    the link for the download of the macro file didn't work, but great video.

    • @0xf0x
      @0xf0x  3 года назад +1

      Thanks for flagging will check this tomorrow 👍

    • @eladbruchim2148
      @eladbruchim2148 3 года назад

      @@0xf0x thanks

    • @0xf0x
      @0xf0x  3 года назад +1

      Link now updated in video description

    • @eladbruchim2148
      @eladbruchim2148 3 года назад +1

      @@0xf0x I really appreciate it thanks for the reply and the effort

  • @D_Tech_And_Trek
    @D_Tech_And_Trek 4 года назад +1

    Most likely Emotet!

    • @0xf0x
      @0xf0x  4 года назад

      Correct 👍